LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 06-21-2002, 07:51 AM   #1
saravanan1979
Member
 
Registered: Jan 2002
Posts: 163

Rep: Reputation: 30
Linsniffer Atttack


Hello
My Linux system (RedHat 6.2) has been hacked.I had reports from ISP that many networks were receiving many illegal probes from my system.I ran ps and found the linsniffer process running in my process list.I have killed the process.Can anyone tell me how to eradicate all the process completely from my system

Regards
Saravaann
 
Old 06-21-2002, 08:39 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I'm sorry to hear this. For now: get the box off the net. Even after investigating what was compromised etc, etc there should be no other clear answer than to save your *human readable data* and rebuild your box from scratch, for the simple reason you can't possibly trust the system anymore. More info: CERT Steps for Recovering from a UNIX or NT System Compromise.

Go for a recent release of your distro, or if you can't due to legacy apps etc etc, at least make sure you upgrade your daemons to a known-good version. Try to keep up to date with your vendors/general vulnerability issues with Linux. I could make a list of what to do to secure your boxen more, but since I'm in --recycling-mode try these links to get a better grip on securing your box: CERT UNIX Security Checklist v2.0, CERT's Techtips,
LASG: Linux Administrator's Security Guide,
Security Quick-Start HOWTO for Linux,
Armoring Linux,
The SANS Reading room: Linux issues,
Bastille Linux Hardening System,
Elementary security for your Linux box.

HTH

Last edited by unSpawn; 06-21-2002 at 08:44 AM.
 
Old 06-21-2002, 08:45 AM   #3
orgcandman
Member
 
Registered: May 2002
Location: new hampshire
Distribution: Fedora, RHEL
Posts: 600

Rep: Reputation: 110Reputation: 110
HOLD UP THERE!!

don't destroy your box yet. get a good suite of forensics tools and figure out how they got in. Then you can safeguard against that same attack. Just rebuilding is pointless unless you learn from it.

I suggest the coroners toolkit, but any forensics toolkit should suffice.

post how they got in if it's really unique so we all can learn.
 
Old 06-21-2002, 09:15 AM   #4
X11
Member
 
Registered: Dec 2001
Location: Brisie, Australia
Distribution: Slackware 8.1
Posts: 324

Rep: Reputation: 30
Quote:
Originally posted by orgcandman
I suggest the coroners toolkit, but any forensics toolkit should suffice.
What's a coroners and forensics toolkit.
 
Old 06-21-2002, 09:27 AM   #5
saravanan1979
Member
 
Registered: Jan 2002
Posts: 163

Original Poster
Rep: Reputation: 30
First let me tell u my setup,my Linux machine is in a network of 80 machines which also has a router.For business reasons any requests coming on Port 80 would be redirected to the Linux machine,so within the network the machine can be accessed by its Ethernet ip of my machine,people outside the network will access using a global ip.After my system was hacked i found 2 files in the network-scripts file ifcfg-eth0(normal file) and
ifcfg-eth0:0 this file had the global ip as its content.Now i deleted the ifcfg-eth0:0 but i still i was able to locate it.Know i restarted my system and i found that eth0 was enabled in prosmicous mode.Then i downed eth0:0 using ifconfig then this ifcfg-eth0:0 could be seen nowhere.
Dear orgcandman
Can u give the details of the forsenic tool kit where could i find this????
 
Old 06-21-2002, 09:34 AM   #6
orgcandman
Member
 
Registered: May 2002
Location: new hampshire
Distribution: Fedora, RHEL
Posts: 600

Rep: Reputation: 110Reputation: 110
forensics toolkits just analyse your system for attacks, and show you the contents of really important files. they allow you to go in and read raw sectors off the disk and look at all of the access logs on a *nix machine. of course, unless you have auditing software (like tripwire or some other file modification detector) the forensics kits aren't gonna be too much help. However, getting chkrootkit and a forensics kit should help you diagnose exactly how your system was attacked.
 
Old 06-21-2002, 09:39 AM   #7
orgcandman
Member
 
Registered: May 2002
Location: new hampshire
Distribution: Fedora, RHEL
Posts: 600

Rep: Reputation: 110Reputation: 110
whoops...most importantly forgot where to get a forensics toolkit.

http://www.porcupine.org/forensics/tct.html

will be the coroners toolkit

IMHO, the best forensics toolkit...period.
 
Old 06-21-2002, 09:42 AM   #8
saravanan1979
Member
 
Registered: Jan 2002
Posts: 163

Original Poster
Rep: Reputation: 30
Dear orgcandman
Thank u fr the info.I just have RH6.2 installed nothing more than that i will try and get bacl to u
Saravanan

Last edited by saravanan1979; 06-21-2002 at 09:44 AM.
 
Old 06-21-2002, 10:00 AM   #9
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Not exactly right. TCT will only show you what's there, but you'll have to do the analysis yourself based on your knowledge of for instance use of MAC-times, snippets of code you find, running strings on binaries, the state of the system, your knowledge of blackhat kinda stuff etc, etc. Btw, TCT requires practicing with it *beforehand*.

File integrity scanners like Aide, Tripwire, Samhain and the like will only be usefull if you kept it current, and if the databases where kept on readonly media (same for the rpm database).

Chkrootkit is a really invaluable tool, but is useless if your system is (suspected) compromised: compile it elsewhere and use static binaries, or better, run it off the Biatchux CD (sourceforge) which has chkrootkit on it (0.35 IIRC), TCT *and* Perl.

Again, if you can't *trust* (keep control) your system, and you've had good indications of that, (make a copy with "dd" of the disk to another drive/host for later examination) and consider reinstalling from scratch.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 12:26 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration